Internet DRAFT - draft-oualha-group-auth

draft-oualha-group-auth



EAP Method Update Working Group                             N. Oualha
Internet Draft                                            A. Olivereau
                                                             CEA LIST
Intended status: Informational                         October 21, 2013
Expires: April 2014


        EAP-based simultaneous re-authentication of a group of nodes
                      draft-oualha-group-auth-00.txt


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, except to publish it
   as an RFC and to translate it into languages other than English.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on April 21, 2014.




oualha                 Expires April 21, 2014                 [Page 1]

Internet-Draft               group-auth                   October 2013


Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document.

Abstract

   This Internet-Draft presents a new scheme that enables the
   simultaneous re-authentication of a group of nodes in an efficient
   manner. The Internet-Draft proposes to aggregate the re-
   authentications of multiple network nodes members of the same group. 
   The scheme is based on the Extensible Authentication Protocol (EAP)
   framework, defined in RFC 3748. As an example of operation, a method
   inspired from EAP-GPSK RFC 5433, is provided.

Table of Contents


   1. Introduction ................................................ 1
   2. Terminology ................................................. 2
   3. Approach overview ........................................... 4
      3.1. Assumptions ............................................ 4
         3.1.1. Network topology .................................. 4
         3.1.2. Secure group communications ....................... 4
         3.1.3. Aggregatable messages ............................. 5
      3.2. Message exchanges ...................................... 5
   4. Extensions to EAP-GPSK ...................................... 6
   5. Security Considerations ..................................... 8
   6. IANA Considerations ......................................... 8
   7. Acknowledgements ............................................ 8
   8. References .................................................. 8
      8.1. Normative References ................................... 8
      8.2. Informative References ................................. 9

1. Introduction

   The initial authentication of a node, sometimes referred to as
   bootstrapping, is generally followed by subsequent re-
   authentications either in a periodic-basis or because of node
   mobility. In some situations, a group of nodes are required to
   perform re-authentication at the same time. For example, nodes may


oualha                 Expires April 21, 2014                 [Page 2]

Internet-Draft               group-auth                   October 2013


   have the same mobility pattern, so they arrive at the same time to a
   new network and need to re-authenticate. In another example, nodes
   may be part of the same network that is subject to some
   administrative changes (e.g., gateway replacement) that require
   nodes to re-authenticate. Besides temporal or spatial proximity of
   nodes, nodes with the same interest to access a given resource or
   service, all may also need to authenticate to the service provider
   to gain access.

   By forming a group of nodes, re-authentications can be aggregated
   within the group of nodes. The advantages of message aggregation are
   multiple:

   o In-network message aggregation allows to reduce the number of
      authentication messages exchanged between the group of nodes and
      the authentication server (typically, the number of messages goes
      from n to log(n) with aggregation). The communication medium, in
      which access is the most expensive element for sensors/actuators
      for example, is less solicited.

   o Thanks to aggregation, the network is less congested. In
      particular, the load at intermediary nodes in the network (e.g.,
      routers) is reduced, making the risk of having a bottleneck
      diminished.

   o The proposed scheme aims to collectively authenticate multiple
      nodes, but the result of authentication concerns each individual
      node. In contrast with the group-based solution proposed in [10],
      the scheme allows to authenticate nodes individually, while
      authentication messages are aggregated.

   The present Internet-Draft defines the new scheme based on
   aggregated authentications. It also extends the EAP authentication
   framework [3] with the ability to aggregate multiple re-
   authentications.

2. Terminology

   This document uses frequently the terms described in [3] and [4].
   The following is a remainder of the used terms:

   Variables:

   ID_Server: Server identity as an opaque blob.

   ID_Group: The identity of the group of nodes. The format of the
   group ID (e.g., application-based identity, IP multicast address)
   depends on how the group is formed.


oualha                 Expires April 21, 2014                 [Page 3]

Internet-Draft               group-auth                   October 2013


   PD_Payload: Data carried within the protected data payload.

   PD_Payload_Block: Block of possibly multiple PD_Payloads carried by
   a packet.

   RAND_Server: Random integer generated by the server (32 octets).

   Operations:

   ENC_(Y): Encryption of message Y with a symmetric key X, using a
   defined block cipher.

   SIGN X(Y): Signature of message Y with a key X, using a defined
   digital signature scheme. For the server, the signature is provided
   using an asymmetric key e.g., based on RSA, or using a symmetric
   group key e.g., based on TESLA [11]. For the node, the signature is
   a keyed message authentication code computed over Y with symmetric
   key X.

   SEC_X(Y): SEC is a function that provides integrity protection based
   on a chosen ciphersuite.  The function SEC uses the algorithm
   defined by the selected ciphersuite and applies it to the message
   content Y with key X. In short, SEC_X(Y) = Y || SIGN_X(Y).

   xor{M}: Aggregation of messages M with an XOR operation. For
   example, xor{M, M', M"} = M xor M'xor M".

   Keys:

   PSK: Long-term key shared between the peer and the server.

   MK: A session-specific Master Key between a node and authentication
   server. MK is derived from PSK as defined in [4].

   PK_p: Session key generated from the MK as defined in [4] and used
   during protocol exchange to encrypt protected data.

   PK_s: Session key generated from a group key (e.g., TESLA [11]) or
   securely shared using an asymmetric key (e.g., server RSA key).

   SK_p: Session key generated from the MK as defined in [4] and used
   during protocol exchange to demonstrate knowledge of the PSK.

   SK_s: Symmetric key derived from a group key (e.g., TESLA [11]) or
   asymmetric key (e.g., server RSA key).





oualha                 Expires April 21, 2014                 [Page 4]

Internet-Draft               group-auth                   October 2013


3. Approach overview

   In the proposed scheme, a group of nodes (sensors/actuators) are re-
   authenticating simultaneously to an authentication server.

   The nodes are authenticating to gain access to the network or to a
   remote resource or service. In the first case, they may connect
   through a gateway; while in the second case, their authentication
   messages may go through a service provider (as defined in [6]). The
   authentication server and the gateway/service provider can be co-
   located (see Figure 1 for a network example).



            N0 -+          +- GW1 --+- Auth. Server
                |          |        |
            N1 -+- IN0 ----+ IN1    |
                           |        |
            N2 --- IN2 ----+        |
                                    |
                    N3 ------ GW2 --+

     Figure 1 Example of a group of nodes composed of 4 leaf nodes (N0,
     ... N3)and 3 intermediate nodes (IN0, ..., IN2). Nodes connect to
         the authentication server through two gateways (GW1, GW2).



3.1. Assumptions

   The scheme relies on the following assumptions.

3.1.1. Network topology

   The scheme considers a network with a topology established according
   to a destination oriented directed acyclic graph. This type of
   topology allows to multicast a common message from a destination to
   a group of nodes of the network. It allows also to aggregate
   messages originated from a group of nodes toward a destination,
   called reverse multicast.

   The network topology can be implemented using an application-based
   multicast scheme or an IP-multicast routing scheme (e.g., RPL [5]).

3.1.2. Secure group communications

   Integrity-protected communications between the group of nodes is
   preferable, in order to minimize pollution attacks, in which


oualha                 Expires April 21, 2014                 [Page 5]

Internet-Draft               group-auth                   October 2013


   attackers insert bogus information into aggregated messages to
   distort the aggregated result.

   The group of nodes is identified by a group ID (e.g., IP multicast
   address).

3.1.3. Aggregatable messages

   The response messages provided by nodes to a given challenge should
   be aggregatable, i.e. messages are aggregated into one message
   smaller than the sum of response messages. Only the aggregated
   result is sent to the authentication server, hence the original
   messages are not available for veri.cation. Still, the
   authentication server should be able to validate the aggregated
   result based on security credentials shared individually with each
   node.

3.2. Message exchanges

   The authentication approach relies on challenge-response messages,
   in which a common challenge is sent to all nodes in the group, and
   nodes' responses are aggregated back to the authentication server.

   The first two exchanged messages in a typical EAP authentication
   protocol, generally concern identity request and response. In the
   proposed approach, these messages can be omitted. The identity of
   the group is implicitly acknowledged by the server. Alternatively,
   the root node of the group may send the group ID to the
   authentication server, if requested by the server.

   The server initiates the message flow by sending a challenge message
   to the group of nodes identified by a group ID. The challenge may
   contain information authenticating the server, if mutual
   authentication is provided. In this case, the server uses either an
   asymmetric key (i.e., digital signature) or a symmetric group key
   (e.g., TESLA [11]).

   Intermediary nodes (e.g., routers) in the group does not immediately
   answer the challenge, instead they wait for their child nodes to
   answer the challenge.

   As the server challenge is received by the leaf nodes in the group,
   these latter send their responses to their parent nodes. The nodes
   use security credentials (e.g., pairwise secret keys) shared with
   the authentication server to generate the response to the challenge.
   They may also authenticate the origin of the received message, if
   mutual authentication is provided.



oualha                 Expires April 21, 2014                 [Page 6]

Internet-Draft               group-auth                   October 2013


   Upon receiving the responses of all child nodes (or after a
   timeout), the intermediary nodes aggregate the received responses
   with their own response, and send the result to their parent nodes.
   Optionally, in case, some of the child nodes do not answer the
   challenge after a timeout because of unavailability (in sleeping
   mode) or failure, their IDs are added to a list that is sent along
   with the aggregated result.

   The aggregated result is finally sent to the authentication server.
   The server checks the received aggregated response. If validation
   succeeds/fails, a common success/failure message is sent to all
   nodes of the group.

   The list of nodes of the group that did not answer the challenge
   sent along with the aggregated result, is used by the server to
   correctly validate the aggregated result, and to send a
   success/failure message only to nodes that participate in the
   authentication process.

   The messages exchanges are summarized in Figure 2.



   End Node          Interm. Node                             Server
       |                   |             Challenge                |
       |                   |<-------------------------------------|
       |    Challenge      |                                      |
       |<------------------|                                      |
       |    Response       |                                      |
       |------------------>|                                      |
       |                   |        Aggregated Responses          |
       |                   |------------------------------------->|
       |                   |           Success/Failure            |
       |                   |<-------------------------------------|
       |  Success/Failure  |                                      |
       |<------------------|                                      |

                    Figure 2 Message exchanges overview



4. Extensions to EAP-GPSK

   As an example of realization, the EAP-GPSK [4] method is extended to
   support the proposed approach.

   Extensions concern mainly the EAP server part at the validation
   phase i.e., the server checks an aggregated result instead of one


oualha                 Expires April 21, 2014                 [Page 7]

Internet-Draft               group-auth                   October 2013


   individual response. At the nodes' side, to be able to authenticate
   server messages, an asymmetric key (i.e., digital signature) or a
   group key (e.g., TESLA [11] group key) are used instead of pairwise
   keys, like it is defined in the original EAP-GPSK.

   Additionally, the first identity request/response messages in the
   protocol are not used. The cipher suite used in the exchange is
   already selected by the server. Nodes that join the group commit to
   the selected cipher suite.

   An extension independent of EAP is also needed at intermediary nodes
   to aggregate responses based on an XOR operation.

   We consider three entities involved in the exchange of EAP messages:
   the end node, the intermediary node (it belongs to the group), and
   the authentication server. A successful extended protocol exchange
   is presented in F                       .igure 3.


    End Node          Interm. Node                             Server
       |       M-1         |                M-1                   |
       |<---------------------------------------------------------|
       |                   |                                      |
       |       M-2         |                M-3                   |
       |--------------------------------------------------------->|
       |                   |                                      |
       |       M-4         |                M-4                   |
       |<---------------------------------------------------------|
       |                   |                                      |
       |       M-5         |                M-6                   |
       |--------------------------------------------------------->|
       |     Success       |              Success                 |
       |<---------------------------------------------------------|

                    Figure 3 Extended EAP-GPSK protocol



   The protocol consists of the following messages:

      M-1: ID_Server, ID_Group, RAND_Server

      M-2: SEC_SK_p(ID_i, ID_Server, RAND_Server,
      [ENC_PK_p(PD_Payload_Block)])

      M-3: xor{M-2}




oualha                 Expires April 21, 2014                 [Page 8]

Internet-Draft               group-auth                   October 2013


      M-4: SEC_SK_s(RAND_Server, ID_Server, ID_Group,
      [ENC_PK_s(PD_Payload_Block)])

      M-5: SEC_SK_p([ENC_PK_p(PD_Payload_Block)])

      M-6: xor{M-5}

5. Security Considerations

   The proposed scheme does not incur substantial changes to the
   original EAP authentication scheme. Authentication is provided by
   demonstrating the knowledge of a secret key: the server uses an
   asymmetric key or a group key to authenticate, while nodes rely on
   their PSK shared with the server. As demonstrated in [9], the
   aggregated result cannot be produced without the knowledge of the
   secret keys. So message aggregation does not reduce the security of
   the protocol.

   The protocol can be still subject to disruption attacks (i.e.,
   denial of service attacks) where, in particular, attackers inject
   false information into the aggregated result. The obtained result
   that is sent to the server is not validated. This type of attacks
   can be limited by securing communications inside the group, such
   that outsider attackers cannot inject bogus information. Insider
   pollution attacks are possible, though.

6. IANA Considerations

   This memo includes no request to IANA.

7. Acknowledgements

   This work is part of the European project TWISNet (Trustworthy
   Wireless Industrial Sensor Network, FP7-ICT-STREP, contract No.
   258280) and is totally funded by the European Union.

8. References

8.1. Normative References

   [1]  Bradner, S., "Key words for use in RFCs to Indicate
         Requirement Levels", BCP 14, RFC 2119, March 1997.

   [2]  Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The Network
         Access Identifier", RFC 4282, December 2005.





oualha                 Expires April 21, 2014                 [Page 9]

Internet-Draft               group-auth                   October 2013


   [3]  Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
         Levkowetz, "Extensible Authentication Protocol (EAP)", RFC
         3748, June 2004.

   [4]  T. Clancy and H. Tschofenig, "Extensible Authentication
         Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method", RFC
         5433, February 2009.

   [5]  T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis,
         K. Pister, R. Struik, JP. Vasseur, and R. Alexander, "RPL:
         IPv6 Routing Protocol for Low-Power and Lossy Networks", RFC
         6550, March 2012.

   [6]  S. Winter and J. Salowey, "Update to the EAP Applicability
         Statement for ABFAB", Internet-Draft draft-ietf-abfab-
         eapapplicability-06, August 19, 2013.

8.2. Informative References

   [7]  Jonathan Katz and Andrew Y. Lindell. Aggregate message
         authentication codes. In Proceedings of the 2008 The
         Cryptopgraphers' Track at the RSA conference on Topics in
         cryptology (CT-RSA'08), Tal Malkin (Ed.). Springer-Verlag,
         Berlin, Heidelberg, 155-169.

   [8]  Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jaggi, and Alon
         Rosen. 2010. RIPPLE authentication for network coding. In
         Proceedings of the 29th conference on Information
         communications (INFOCOM'10). IEEE Press, Piscataway, NJ, USA,
         2258-2266.

   [9]  Jonathan Katz and Andrew Y. Lindell. Aggregate message
         authentication codes. In Proceedings of the 2008 The
         Cryptopgraphers' Track at the RSA conference on Topics in
         cryptology (CT-RSA'08), Tal Malkin (Ed.). Springer-Verlag,
         Berlin, Heidelberg, 155-169.

   [10] Group-based authentication method of machine type
         communication (MTC) nodes. CN 102088668 A (UNIV XIDIAN), 08-
         Jun-2011.

   [11] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The tesla
         broadcast authentication protocol," RSA CryptoBytes, Volume 5,
         No. 2 Summer/Fall 2002.






oualha                 Expires April 21, 2014                [Page 10]

Internet-Draft               group-auth                   October 2013


   Authors' Addresses

   Nouha Oualha
   CEA LIST
   CEA Saclay, 91191 Gif sur Yvette, France

   Phone: +33 169084625
   Email: Nouha.oualha@cea.fr


   Alexis Olivereau
   CEA LIST
   CEA Saclay, 91191 Gif sur Yvette, France

   Phone: +33 169089233
   Email: alexis.olivereau@cea.fr

































oualha                 Expires April 21, 2014                [Page 11]